Answer the question
In order to leave comments, you need to log in
Decryption algorithms by strings and a possible key
There are 4 different strings like 326c7310add8008334bfb212f5e7caeb.
they lead to a file with id=28185
what algorithms can be used to decrypt the algorithm for getting a string?
Answer the question
In order to leave comments, you need to log in
The main thing is to understand why there is a hash and the integrity of what they are trying to preserve.
web application? But didn’t you think that there is simply an id <-> hash plate, according to which the file is searched for and there may not be any direct connection?
Similar to MD5. Try using Rainbow Tables to reverse it. Just need to download a LOT ;-)
try to sort through the standard hash function algorithms: md5 (it seems not good - the hash is too long), sha1, sha256, etc. But most likely nothing will come of it;)
hmm ... IMHO the author gave very little input data, but still ...
“There are 4 different lines of the form ...” - most likely the encrypted one is not directly related to “id = 28185”.
For example, on a certain service, a user wants to download a file with id=28185. As an option:
1. md5 is taken from time() + process pid + anything else
2. these id and md5 are written to a table in which, let's say, two columns fileid and md5hash
3. after some request, which includes 326c7310add8008334bfb212f5e7caeb from this the original id is obtained on the plate, something is done (for example, some information is given to the user) and the record crashes.
In this situation, whatdo you want to get the output? What was encrypted via md5? So there for certain a set of the unnecessary data. Relationship between md5 and id? So it may not exist at all ...
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question